DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system

Mobile ad hoc networks (MANETs) are mobile networks, which are automatically outspread on a geographically limited region, without requiring any preexisting infrastructure. Mostly, nodes are both self-governed and self-organized without requiring a central monitoring. Because of their distributed characteristic, MANETs are vulnerable to a particular routing misbehavior, called wormhole attack. In wormhole attack, one attacker node tunnels packet from its position to the other attacker nodes. Such wormhole attack results in a fake route with fewer hop count. If source node selects this fictitious route, attacker nodes have the options of delivering the packets or dropping them. For this reason, this paper proposes an improvement over AODV routing protocol to design a wormhole-immune routing protocol. The proposed protocol called defending against wormhole attack (DAWA) employs fuzzy logic system and artificial immune system to defend against wormhole attacks. DAWA is evaluated through extensive simulations in the NS-2 environment. The results show that DAWA outperforms other existing solutions in terms of false negative ratio, false positive ratio, detection ratio, packet delivery ratio, packets loss ratio and packets drop ratio.

[1]  Shahram Jamali,et al.  Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .

[2]  Anal Patel,et al.  Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[3]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[4]  Alan S. Perelson,et al.  The immune system, adaptation, and machine learning , 1986 .

[5]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[6]  Terje Aven,et al.  An approach to maintenance optimization where safety issues are important , 2010, Reliab. Eng. Syst. Saf..

[7]  A. Perelson Immune Network Theory , 1989, Immunological reviews.

[8]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[9]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[10]  Helena Szczerbicka,et al.  AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.

[11]  Bin Wang,et al.  Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..

[12]  Mustapha Nourelfath,et al.  Extra-capacity versus protection for supply networks under attack , 2014, Reliab. Eng. Syst. Saf..

[13]  Shahram Jamali,et al.  Defense against SYN flooding attacks: A particle swarm optimization approach , 2014, Comput. Electr. Eng..

[14]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[15]  Sheng Zhong,et al.  DAWN: Defending against wormhole attacks in wireless network coding systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[16]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[17]  Xiangke Liao,et al.  WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks , 2013, 2013 42nd International Conference on Parallel Processing.

[18]  K. V. Kumar,et al.  A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in Mobile Ad Hoc Networks , 2012, 2012 International Conference on Computing Sciences.

[19]  Geerten van de Kaa,et al.  Mobile telecommunication standardization in Japan, China, the United States, and Europe: a comparison of regulatory and industrial regimes , 2017, Telecommun. Syst..

[20]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[21]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .

[22]  Nabendu Chaki,et al.  A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[23]  Tao Zhou An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..

[24]  Nor Badrul Anuar,et al.  Malicious accounts: Dark of the social networks , 2017, J. Netw. Comput. Appl..

[25]  Brendan Jennings,et al.  Semantic aware processing of user defined inference rules to manage home networks , 2017, J. Netw. Comput. Appl..

[26]  Jidong Wang,et al.  An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set , 2012 .

[27]  Vandana Dubey,et al.  Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[28]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[29]  Zuowen Tan An efficient identity-based tripartite authenticated key agreement protocol , 2012, Electron. Commer. Res..

[30]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[31]  Katina Michael,et al.  Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..

[32]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[33]  Mohammad S. Obaidat,et al.  Wormhole prevention using COTA mechanism in position based environment over MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).